[FONT=&amp]According to a new story on Ars Technica, no sooner has iOS 6.1.3 been released, largely to correct a lock-screen vulnerability, a new such vulnerability has been found. The bug was found by a YouTuber, videosdebarraquito, who detailed his findings in the video that heads this post. Basically, what he has discovered is that in order to bypass the password lock, and potentially gain access to a personâ€™s private data on their iPhone, a person with malicious intent can simply eject the iPhone SIM card when using the voice control to make a call. The phone used in the video is an iPhone 4, which of course does not have Siri, but as Ars Technica explains, the bug does not actually work with Siri: it in fact uses the older Voice Control feature that was available prior to Siri. Various websites have tested the bug to see what phones are vulnerable, and it appears that The Next Web was able to get it to work on an iPhone 4S, but not an iPhone 5, although Ars Technica says that German website iPhoneblog.de did manage to get it to work on an iPhone 5. Doubtless Apple is busy reading a new fix for this bug too![/FONT]

Useful Searches

About iPadForums.net

iPadForums.net is a community dedicated to the Apple iPad. We discuss various topics including iPad Help, iPad Reviews, iPad Apps, iPad Accessories (such as iPad Keyboards, iPad Cases, iPad Covers), iPad Games and more.

iPadForums.net is not affiliated with Apple. We are an enthusiast site dedicated to everything Apple iPad (iPad 1 and iPad 2)